Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 04 Sep 2008 12:06:07 +0800
From: Eugene Teo <>
Subject: CVE request: kernel: dio: zero struct dio with kzalloc instead of

Hi Steve,

Is this assigned with a CVE name already? If not, please allocate one.

This upstream commit addressed a user triggerable DoS:

[PATCH] dio: zero struct dio with kzalloc instead of manually

To avoid exposing ourselves to the risk of finding another field like
.map_bh.b_state where we rely on zeroing but don't enforce it in the
code. The fix uses kzalloc to zero all the struct dio rather than
manually trying to track which fields we rely on being zero.



Thanks, Eugene
Eugene Teo / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ